.. | .. |
---|
| 1 | +// SPDX-License-Identifier: GPL-2.0-or-later |
---|
1 | 2 | /* |
---|
2 | 3 | * |
---|
3 | 4 | * Bluetooth support for Intel devices |
---|
4 | 5 | * |
---|
5 | 6 | * Copyright (C) 2015 Intel Corporation |
---|
6 | | - * |
---|
7 | | - * |
---|
8 | | - * This program is free software; you can redistribute it and/or modify |
---|
9 | | - * it under the terms of the GNU General Public License as published by |
---|
10 | | - * the Free Software Foundation; either version 2 of the License, or |
---|
11 | | - * (at your option) any later version. |
---|
12 | | - * |
---|
13 | | - * This program is distributed in the hope that it will be useful, |
---|
14 | | - * but WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
15 | | - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
---|
16 | | - * GNU General Public License for more details. |
---|
17 | | - * |
---|
18 | | - * You should have received a copy of the GNU General Public License |
---|
19 | | - * along with this program; if not, write to the Free Software |
---|
20 | | - * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
---|
21 | | - * |
---|
22 | 7 | */ |
---|
23 | 8 | |
---|
24 | 9 | #include <linux/module.h> |
---|
.. | .. |
---|
33 | 18 | |
---|
34 | 19 | #define VERSION "0.1" |
---|
35 | 20 | |
---|
36 | | -#define BDADDR_INTEL (&(bdaddr_t) {{0x00, 0x8b, 0x9e, 0x19, 0x03, 0x00}}) |
---|
| 21 | +#define BDADDR_INTEL (&(bdaddr_t){{0x00, 0x8b, 0x9e, 0x19, 0x03, 0x00}}) |
---|
| 22 | +#define RSA_HEADER_LEN 644 |
---|
| 23 | +#define CSS_HEADER_OFFSET 8 |
---|
| 24 | +#define ECDSA_OFFSET 644 |
---|
| 25 | +#define ECDSA_HEADER_LEN 320 |
---|
37 | 26 | |
---|
38 | 27 | int btintel_check_bdaddr(struct hci_dev *hdev) |
---|
39 | 28 | { |
---|
.. | .. |
---|
375 | 364 | } |
---|
376 | 365 | EXPORT_SYMBOL_GPL(btintel_read_version); |
---|
377 | 366 | |
---|
| 367 | +void btintel_version_info_tlv(struct hci_dev *hdev, struct intel_version_tlv *version) |
---|
| 368 | +{ |
---|
| 369 | + const char *variant; |
---|
| 370 | + |
---|
| 371 | + switch (version->img_type) { |
---|
| 372 | + case 0x01: |
---|
| 373 | + variant = "Bootloader"; |
---|
| 374 | + bt_dev_info(hdev, "Device revision is %u", version->dev_rev_id); |
---|
| 375 | + bt_dev_info(hdev, "Secure boot is %s", |
---|
| 376 | + version->secure_boot ? "enabled" : "disabled"); |
---|
| 377 | + bt_dev_info(hdev, "OTP lock is %s", |
---|
| 378 | + version->otp_lock ? "enabled" : "disabled"); |
---|
| 379 | + bt_dev_info(hdev, "API lock is %s", |
---|
| 380 | + version->api_lock ? "enabled" : "disabled"); |
---|
| 381 | + bt_dev_info(hdev, "Debug lock is %s", |
---|
| 382 | + version->debug_lock ? "enabled" : "disabled"); |
---|
| 383 | + bt_dev_info(hdev, "Minimum firmware build %u week %u %u", |
---|
| 384 | + version->min_fw_build_nn, version->min_fw_build_cw, |
---|
| 385 | + 2000 + version->min_fw_build_yy); |
---|
| 386 | + break; |
---|
| 387 | + case 0x03: |
---|
| 388 | + variant = "Firmware"; |
---|
| 389 | + break; |
---|
| 390 | + default: |
---|
| 391 | + bt_dev_err(hdev, "Unsupported image type(%02x)", version->img_type); |
---|
| 392 | + goto done; |
---|
| 393 | + } |
---|
| 394 | + |
---|
| 395 | + bt_dev_info(hdev, "%s timestamp %u.%u buildtype %u build %u", variant, |
---|
| 396 | + 2000 + (version->timestamp >> 8), version->timestamp & 0xff, |
---|
| 397 | + version->build_type, version->build_num); |
---|
| 398 | + |
---|
| 399 | +done: |
---|
| 400 | + return; |
---|
| 401 | +} |
---|
| 402 | +EXPORT_SYMBOL_GPL(btintel_version_info_tlv); |
---|
| 403 | + |
---|
| 404 | +int btintel_read_version_tlv(struct hci_dev *hdev, struct intel_version_tlv *version) |
---|
| 405 | +{ |
---|
| 406 | + struct sk_buff *skb; |
---|
| 407 | + const u8 param[1] = { 0xFF }; |
---|
| 408 | + |
---|
| 409 | + if (!version) |
---|
| 410 | + return -EINVAL; |
---|
| 411 | + |
---|
| 412 | + skb = __hci_cmd_sync(hdev, 0xfc05, 1, param, HCI_CMD_TIMEOUT); |
---|
| 413 | + if (IS_ERR(skb)) { |
---|
| 414 | + bt_dev_err(hdev, "Reading Intel version information failed (%ld)", |
---|
| 415 | + PTR_ERR(skb)); |
---|
| 416 | + return PTR_ERR(skb); |
---|
| 417 | + } |
---|
| 418 | + |
---|
| 419 | + if (skb->data[0]) { |
---|
| 420 | + bt_dev_err(hdev, "Intel Read Version command failed (%02x)", |
---|
| 421 | + skb->data[0]); |
---|
| 422 | + kfree_skb(skb); |
---|
| 423 | + return -EIO; |
---|
| 424 | + } |
---|
| 425 | + |
---|
| 426 | + /* Consume Command Complete Status field */ |
---|
| 427 | + skb_pull(skb, 1); |
---|
| 428 | + |
---|
| 429 | + /* Event parameters contatin multiple TLVs. Read each of them |
---|
| 430 | + * and only keep the required data. Also, it use existing legacy |
---|
| 431 | + * version field like hw_platform, hw_variant, and fw_variant |
---|
| 432 | + * to keep the existing setup flow |
---|
| 433 | + */ |
---|
| 434 | + while (skb->len) { |
---|
| 435 | + struct intel_tlv *tlv; |
---|
| 436 | + |
---|
| 437 | + tlv = (struct intel_tlv *)skb->data; |
---|
| 438 | + switch (tlv->type) { |
---|
| 439 | + case INTEL_TLV_CNVI_TOP: |
---|
| 440 | + version->cnvi_top = get_unaligned_le32(tlv->val); |
---|
| 441 | + break; |
---|
| 442 | + case INTEL_TLV_CNVR_TOP: |
---|
| 443 | + version->cnvr_top = get_unaligned_le32(tlv->val); |
---|
| 444 | + break; |
---|
| 445 | + case INTEL_TLV_CNVI_BT: |
---|
| 446 | + version->cnvi_bt = get_unaligned_le32(tlv->val); |
---|
| 447 | + break; |
---|
| 448 | + case INTEL_TLV_CNVR_BT: |
---|
| 449 | + version->cnvr_bt = get_unaligned_le32(tlv->val); |
---|
| 450 | + break; |
---|
| 451 | + case INTEL_TLV_DEV_REV_ID: |
---|
| 452 | + version->dev_rev_id = get_unaligned_le16(tlv->val); |
---|
| 453 | + break; |
---|
| 454 | + case INTEL_TLV_IMAGE_TYPE: |
---|
| 455 | + version->img_type = tlv->val[0]; |
---|
| 456 | + break; |
---|
| 457 | + case INTEL_TLV_TIME_STAMP: |
---|
| 458 | + version->timestamp = get_unaligned_le16(tlv->val); |
---|
| 459 | + break; |
---|
| 460 | + case INTEL_TLV_BUILD_TYPE: |
---|
| 461 | + version->build_type = tlv->val[0]; |
---|
| 462 | + break; |
---|
| 463 | + case INTEL_TLV_BUILD_NUM: |
---|
| 464 | + version->build_num = get_unaligned_le32(tlv->val); |
---|
| 465 | + break; |
---|
| 466 | + case INTEL_TLV_SECURE_BOOT: |
---|
| 467 | + version->secure_boot = tlv->val[0]; |
---|
| 468 | + break; |
---|
| 469 | + case INTEL_TLV_OTP_LOCK: |
---|
| 470 | + version->otp_lock = tlv->val[0]; |
---|
| 471 | + break; |
---|
| 472 | + case INTEL_TLV_API_LOCK: |
---|
| 473 | + version->api_lock = tlv->val[0]; |
---|
| 474 | + break; |
---|
| 475 | + case INTEL_TLV_DEBUG_LOCK: |
---|
| 476 | + version->debug_lock = tlv->val[0]; |
---|
| 477 | + break; |
---|
| 478 | + case INTEL_TLV_MIN_FW: |
---|
| 479 | + version->min_fw_build_nn = tlv->val[0]; |
---|
| 480 | + version->min_fw_build_cw = tlv->val[1]; |
---|
| 481 | + version->min_fw_build_yy = tlv->val[2]; |
---|
| 482 | + break; |
---|
| 483 | + case INTEL_TLV_LIMITED_CCE: |
---|
| 484 | + version->limited_cce = tlv->val[0]; |
---|
| 485 | + break; |
---|
| 486 | + case INTEL_TLV_SBE_TYPE: |
---|
| 487 | + version->sbe_type = tlv->val[0]; |
---|
| 488 | + break; |
---|
| 489 | + case INTEL_TLV_OTP_BDADDR: |
---|
| 490 | + memcpy(&version->otp_bd_addr, tlv->val, tlv->len); |
---|
| 491 | + break; |
---|
| 492 | + default: |
---|
| 493 | + /* Ignore rest of information */ |
---|
| 494 | + break; |
---|
| 495 | + } |
---|
| 496 | + /* consume the current tlv and move to next*/ |
---|
| 497 | + skb_pull(skb, tlv->len + sizeof(*tlv)); |
---|
| 498 | + } |
---|
| 499 | + |
---|
| 500 | + kfree_skb(skb); |
---|
| 501 | + return 0; |
---|
| 502 | +} |
---|
| 503 | +EXPORT_SYMBOL_GPL(btintel_read_version_tlv); |
---|
| 504 | + |
---|
378 | 505 | /* ------- REGMAP IBT SUPPORT ------- */ |
---|
379 | 506 | |
---|
380 | 507 | #define IBT_REG_MODE_8BIT 0x00 |
---|
.. | .. |
---|
391 | 518 | __le32 addr; |
---|
392 | 519 | __u8 mode; |
---|
393 | 520 | __u8 len; |
---|
394 | | - __u8 data[0]; |
---|
| 521 | + __u8 data[]; |
---|
395 | 522 | } __packed; |
---|
396 | 523 | |
---|
397 | 524 | struct ibt_rp_reg_access { |
---|
398 | 525 | __u8 status; |
---|
399 | 526 | __le32 addr; |
---|
400 | | - __u8 data[0]; |
---|
| 527 | + __u8 data[]; |
---|
401 | 528 | } __packed; |
---|
402 | 529 | |
---|
403 | 530 | static int regmap_ibt_read(void *context, const void *addr, size_t reg_size, |
---|
.. | .. |
---|
641 | 768 | } |
---|
642 | 769 | EXPORT_SYMBOL_GPL(btintel_read_boot_params); |
---|
643 | 770 | |
---|
644 | | -int btintel_download_firmware(struct hci_dev *hdev, const struct firmware *fw, |
---|
645 | | - u32 *boot_param) |
---|
| 771 | +static int btintel_sfi_rsa_header_secure_send(struct hci_dev *hdev, |
---|
| 772 | + const struct firmware *fw) |
---|
646 | 773 | { |
---|
647 | 774 | int err; |
---|
648 | | - const u8 *fw_ptr; |
---|
649 | | - u32 frag_len; |
---|
650 | 775 | |
---|
651 | 776 | /* Start the firmware download transaction with the Init fragment |
---|
652 | 777 | * represented by the 128 bytes of CSS header. |
---|
.. | .. |
---|
675 | 800 | goto done; |
---|
676 | 801 | } |
---|
677 | 802 | |
---|
678 | | - fw_ptr = fw->data + 644; |
---|
| 803 | +done: |
---|
| 804 | + return err; |
---|
| 805 | +} |
---|
| 806 | + |
---|
| 807 | +static int btintel_sfi_ecdsa_header_secure_send(struct hci_dev *hdev, |
---|
| 808 | + const struct firmware *fw) |
---|
| 809 | +{ |
---|
| 810 | + int err; |
---|
| 811 | + |
---|
| 812 | + /* Start the firmware download transaction with the Init fragment |
---|
| 813 | + * represented by the 128 bytes of CSS header. |
---|
| 814 | + */ |
---|
| 815 | + err = btintel_secure_send(hdev, 0x00, 128, fw->data + 644); |
---|
| 816 | + if (err < 0) { |
---|
| 817 | + bt_dev_err(hdev, "Failed to send firmware header (%d)", err); |
---|
| 818 | + return err; |
---|
| 819 | + } |
---|
| 820 | + |
---|
| 821 | + /* Send the 96 bytes of public key information from the firmware |
---|
| 822 | + * as the PKey fragment. |
---|
| 823 | + */ |
---|
| 824 | + err = btintel_secure_send(hdev, 0x03, 96, fw->data + 644 + 128); |
---|
| 825 | + if (err < 0) { |
---|
| 826 | + bt_dev_err(hdev, "Failed to send firmware pkey (%d)", err); |
---|
| 827 | + return err; |
---|
| 828 | + } |
---|
| 829 | + |
---|
| 830 | + /* Send the 96 bytes of signature information from the firmware |
---|
| 831 | + * as the Sign fragment |
---|
| 832 | + */ |
---|
| 833 | + err = btintel_secure_send(hdev, 0x02, 96, fw->data + 644 + 224); |
---|
| 834 | + if (err < 0) { |
---|
| 835 | + bt_dev_err(hdev, "Failed to send firmware signature (%d)", |
---|
| 836 | + err); |
---|
| 837 | + return err; |
---|
| 838 | + } |
---|
| 839 | + return 0; |
---|
| 840 | +} |
---|
| 841 | + |
---|
| 842 | +static int btintel_download_firmware_payload(struct hci_dev *hdev, |
---|
| 843 | + const struct firmware *fw, |
---|
| 844 | + u32 *boot_param, size_t offset) |
---|
| 845 | +{ |
---|
| 846 | + int err; |
---|
| 847 | + const u8 *fw_ptr; |
---|
| 848 | + u32 frag_len; |
---|
| 849 | + |
---|
| 850 | + fw_ptr = fw->data + offset; |
---|
679 | 851 | frag_len = 0; |
---|
| 852 | + err = -EINVAL; |
---|
680 | 853 | |
---|
681 | 854 | while (fw_ptr - fw->data < fw->size) { |
---|
682 | 855 | struct hci_command_hdr *cmd = (void *)(fw_ptr + frag_len); |
---|
.. | .. |
---|
722 | 895 | done: |
---|
723 | 896 | return err; |
---|
724 | 897 | } |
---|
| 898 | + |
---|
| 899 | +int btintel_download_firmware(struct hci_dev *hdev, |
---|
| 900 | + const struct firmware *fw, |
---|
| 901 | + u32 *boot_param) |
---|
| 902 | +{ |
---|
| 903 | + int err; |
---|
| 904 | + |
---|
| 905 | + err = btintel_sfi_rsa_header_secure_send(hdev, fw); |
---|
| 906 | + if (err) |
---|
| 907 | + return err; |
---|
| 908 | + |
---|
| 909 | + return btintel_download_firmware_payload(hdev, fw, boot_param, |
---|
| 910 | + RSA_HEADER_LEN); |
---|
| 911 | +} |
---|
725 | 912 | EXPORT_SYMBOL_GPL(btintel_download_firmware); |
---|
726 | 913 | |
---|
| 914 | +int btintel_download_firmware_newgen(struct hci_dev *hdev, |
---|
| 915 | + const struct firmware *fw, u32 *boot_param, |
---|
| 916 | + u8 hw_variant, u8 sbe_type) |
---|
| 917 | +{ |
---|
| 918 | + int err; |
---|
| 919 | + u32 css_header_ver; |
---|
| 920 | + |
---|
| 921 | + /* iBT hardware variants 0x0b, 0x0c, 0x11, 0x12, 0x13, 0x14 support |
---|
| 922 | + * only RSA secure boot engine. Hence, the corresponding sfi file will |
---|
| 923 | + * have RSA header of 644 bytes followed by Command Buffer. |
---|
| 924 | + * |
---|
| 925 | + * iBT hardware variants 0x17, 0x18 onwards support both RSA and ECDSA |
---|
| 926 | + * secure boot engine. As a result, the corresponding sfi file will |
---|
| 927 | + * have RSA header of 644, ECDSA header of 320 bytes followed by |
---|
| 928 | + * Command Buffer. |
---|
| 929 | + * |
---|
| 930 | + * CSS Header byte positions 0x08 to 0x0B represent the CSS Header |
---|
| 931 | + * version: RSA(0x00010000) , ECDSA (0x00020000) |
---|
| 932 | + */ |
---|
| 933 | + css_header_ver = get_unaligned_le32(fw->data + CSS_HEADER_OFFSET); |
---|
| 934 | + if (css_header_ver != 0x00010000) { |
---|
| 935 | + bt_dev_err(hdev, "Invalid CSS Header version"); |
---|
| 936 | + return -EINVAL; |
---|
| 937 | + } |
---|
| 938 | + |
---|
| 939 | + if (hw_variant <= 0x14) { |
---|
| 940 | + if (sbe_type != 0x00) { |
---|
| 941 | + bt_dev_err(hdev, "Invalid SBE type for hardware variant (%d)", |
---|
| 942 | + hw_variant); |
---|
| 943 | + return -EINVAL; |
---|
| 944 | + } |
---|
| 945 | + |
---|
| 946 | + err = btintel_sfi_rsa_header_secure_send(hdev, fw); |
---|
| 947 | + if (err) |
---|
| 948 | + return err; |
---|
| 949 | + |
---|
| 950 | + err = btintel_download_firmware_payload(hdev, fw, boot_param, RSA_HEADER_LEN); |
---|
| 951 | + if (err) |
---|
| 952 | + return err; |
---|
| 953 | + } else if (hw_variant >= 0x17) { |
---|
| 954 | + /* Check if CSS header for ECDSA follows the RSA header */ |
---|
| 955 | + if (fw->data[ECDSA_OFFSET] != 0x06) |
---|
| 956 | + return -EINVAL; |
---|
| 957 | + |
---|
| 958 | + /* Check if the CSS Header version is ECDSA(0x00020000) */ |
---|
| 959 | + css_header_ver = get_unaligned_le32(fw->data + ECDSA_OFFSET + CSS_HEADER_OFFSET); |
---|
| 960 | + if (css_header_ver != 0x00020000) { |
---|
| 961 | + bt_dev_err(hdev, "Invalid CSS Header version"); |
---|
| 962 | + return -EINVAL; |
---|
| 963 | + } |
---|
| 964 | + |
---|
| 965 | + if (sbe_type == 0x00) { |
---|
| 966 | + err = btintel_sfi_rsa_header_secure_send(hdev, fw); |
---|
| 967 | + if (err) |
---|
| 968 | + return err; |
---|
| 969 | + |
---|
| 970 | + err = btintel_download_firmware_payload(hdev, fw, |
---|
| 971 | + boot_param, |
---|
| 972 | + RSA_HEADER_LEN + ECDSA_HEADER_LEN); |
---|
| 973 | + if (err) |
---|
| 974 | + return err; |
---|
| 975 | + } else if (sbe_type == 0x01) { |
---|
| 976 | + err = btintel_sfi_ecdsa_header_secure_send(hdev, fw); |
---|
| 977 | + if (err) |
---|
| 978 | + return err; |
---|
| 979 | + |
---|
| 980 | + err = btintel_download_firmware_payload(hdev, fw, |
---|
| 981 | + boot_param, |
---|
| 982 | + RSA_HEADER_LEN + ECDSA_HEADER_LEN); |
---|
| 983 | + if (err) |
---|
| 984 | + return err; |
---|
| 985 | + } |
---|
| 986 | + } |
---|
| 987 | + return 0; |
---|
| 988 | +} |
---|
| 989 | +EXPORT_SYMBOL_GPL(btintel_download_firmware_newgen); |
---|
| 990 | + |
---|
| 991 | +void btintel_reset_to_bootloader(struct hci_dev *hdev) |
---|
| 992 | +{ |
---|
| 993 | + struct intel_reset params; |
---|
| 994 | + struct sk_buff *skb; |
---|
| 995 | + |
---|
| 996 | + /* Send Intel Reset command. This will result in |
---|
| 997 | + * re-enumeration of BT controller. |
---|
| 998 | + * |
---|
| 999 | + * Intel Reset parameter description: |
---|
| 1000 | + * reset_type : 0x00 (Soft reset), |
---|
| 1001 | + * 0x01 (Hard reset) |
---|
| 1002 | + * patch_enable : 0x00 (Do not enable), |
---|
| 1003 | + * 0x01 (Enable) |
---|
| 1004 | + * ddc_reload : 0x00 (Do not reload), |
---|
| 1005 | + * 0x01 (Reload) |
---|
| 1006 | + * boot_option: 0x00 (Current image), |
---|
| 1007 | + * 0x01 (Specified boot address) |
---|
| 1008 | + * boot_param: Boot address |
---|
| 1009 | + * |
---|
| 1010 | + */ |
---|
| 1011 | + params.reset_type = 0x01; |
---|
| 1012 | + params.patch_enable = 0x01; |
---|
| 1013 | + params.ddc_reload = 0x01; |
---|
| 1014 | + params.boot_option = 0x00; |
---|
| 1015 | + params.boot_param = cpu_to_le32(0x00000000); |
---|
| 1016 | + |
---|
| 1017 | + skb = __hci_cmd_sync(hdev, 0xfc01, sizeof(params), |
---|
| 1018 | + ¶ms, HCI_INIT_TIMEOUT); |
---|
| 1019 | + if (IS_ERR(skb)) { |
---|
| 1020 | + bt_dev_err(hdev, "FW download error recovery failed (%ld)", |
---|
| 1021 | + PTR_ERR(skb)); |
---|
| 1022 | + return; |
---|
| 1023 | + } |
---|
| 1024 | + bt_dev_info(hdev, "Intel reset sent to retry FW download"); |
---|
| 1025 | + kfree_skb(skb); |
---|
| 1026 | + |
---|
| 1027 | + /* Current Intel BT controllers(ThP/JfP) hold the USB reset |
---|
| 1028 | + * lines for 2ms when it receives Intel Reset in bootloader mode. |
---|
| 1029 | + * Whereas, the upcoming Intel BT controllers will hold USB reset |
---|
| 1030 | + * for 150ms. To keep the delay generic, 150ms is chosen here. |
---|
| 1031 | + */ |
---|
| 1032 | + msleep(150); |
---|
| 1033 | +} |
---|
| 1034 | +EXPORT_SYMBOL_GPL(btintel_reset_to_bootloader); |
---|
| 1035 | + |
---|
| 1036 | +int btintel_read_debug_features(struct hci_dev *hdev, |
---|
| 1037 | + struct intel_debug_features *features) |
---|
| 1038 | +{ |
---|
| 1039 | + struct sk_buff *skb; |
---|
| 1040 | + u8 page_no = 1; |
---|
| 1041 | + |
---|
| 1042 | + /* Intel controller supports two pages, each page is of 128-bit |
---|
| 1043 | + * feature bit mask. And each bit defines specific feature support |
---|
| 1044 | + */ |
---|
| 1045 | + skb = __hci_cmd_sync(hdev, 0xfca6, sizeof(page_no), &page_no, |
---|
| 1046 | + HCI_INIT_TIMEOUT); |
---|
| 1047 | + if (IS_ERR(skb)) { |
---|
| 1048 | + bt_dev_err(hdev, "Reading supported features failed (%ld)", |
---|
| 1049 | + PTR_ERR(skb)); |
---|
| 1050 | + return PTR_ERR(skb); |
---|
| 1051 | + } |
---|
| 1052 | + |
---|
| 1053 | + if (skb->len != (sizeof(features->page1) + 3)) { |
---|
| 1054 | + bt_dev_err(hdev, "Supported features event size mismatch"); |
---|
| 1055 | + kfree_skb(skb); |
---|
| 1056 | + return -EILSEQ; |
---|
| 1057 | + } |
---|
| 1058 | + |
---|
| 1059 | + memcpy(features->page1, skb->data + 3, sizeof(features->page1)); |
---|
| 1060 | + |
---|
| 1061 | + /* Read the supported features page2 if required in future. |
---|
| 1062 | + */ |
---|
| 1063 | + kfree_skb(skb); |
---|
| 1064 | + return 0; |
---|
| 1065 | +} |
---|
| 1066 | +EXPORT_SYMBOL_GPL(btintel_read_debug_features); |
---|
| 1067 | + |
---|
| 1068 | +int btintel_set_debug_features(struct hci_dev *hdev, |
---|
| 1069 | + const struct intel_debug_features *features) |
---|
| 1070 | +{ |
---|
| 1071 | + u8 mask[11] = { 0x0a, 0x92, 0x02, 0x07, 0x00, 0x00, 0x00, 0x00, |
---|
| 1072 | + 0x00, 0x00, 0x00 }; |
---|
| 1073 | + struct sk_buff *skb; |
---|
| 1074 | + |
---|
| 1075 | + if (!features) |
---|
| 1076 | + return -EINVAL; |
---|
| 1077 | + |
---|
| 1078 | + if (!(features->page1[0] & 0x3f)) { |
---|
| 1079 | + bt_dev_info(hdev, "Telemetry exception format not supported"); |
---|
| 1080 | + return 0; |
---|
| 1081 | + } |
---|
| 1082 | + |
---|
| 1083 | + skb = __hci_cmd_sync(hdev, 0xfc8b, 11, mask, HCI_INIT_TIMEOUT); |
---|
| 1084 | + if (IS_ERR(skb)) { |
---|
| 1085 | + bt_dev_err(hdev, "Setting Intel telemetry ddc write event mask failed (%ld)", |
---|
| 1086 | + PTR_ERR(skb)); |
---|
| 1087 | + return PTR_ERR(skb); |
---|
| 1088 | + } |
---|
| 1089 | + |
---|
| 1090 | + kfree_skb(skb); |
---|
| 1091 | + return 0; |
---|
| 1092 | +} |
---|
| 1093 | +EXPORT_SYMBOL_GPL(btintel_set_debug_features); |
---|
| 1094 | + |
---|
727 | 1095 | MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>"); |
---|
728 | 1096 | MODULE_DESCRIPTION("Bluetooth support for Intel devices ver " VERSION); |
---|
729 | 1097 | MODULE_VERSION(VERSION); |
---|